AR-FR11 VERSION M.20
CSV information ?
Status | archived |
---|---|
Valid from | 03.06.2005 |
Valid until | 07.10.2013 |
Scheme | 🇯🇵 JP |
Manufacturer | Sharp Corporation |
Category | Other Devices and Systems |
Security level | EAL3 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Security level
EAL3Claims
T.RECOVER, T.SHUNT, T.SPOOF, A.NETWORK, A.OPERATOR, A.USERCertificates
CRP-C0026-01, Certification No. C0026Standards
ISO/IEC 15408:1999, CCIMB-99-032, CCIMB-99-033, CCIMB-99-031File metadata
Title | CRP-e |
---|---|
Subject | C0026 |
Author | IPA/JISEC |
Creation date | D:20050715113927+09'00' |
Modification date | D:20050715114102+09'00' |
Pages | 26 |
Creator | Word 用 Acrobat PDFMaker 6.0 |
Producer | Acrobat Distiller 6.0 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, RijndaelVendor
MicrosoftSecurity level
EAL3Claims
O.RESIDUAL, O.REMOVE, O.MANAGE, O.NSP, O.UAU, T.RECOVER, T.SHUNT, T.SPOOF, A.NETWORK, A.OPERATOR, A.USER, OE.BROWSER, OE.CIPHER, OE.CLIENT, OE.FIREWALL, OE.OPERATE, OE.USERSecurity Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_RCR.1, ADV_HLD.1, ADV_HLD.2, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1, FDP_ITC.1, FDP_RIP.1.1, FDP_RIP.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.1, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.6, FIA_UAU.7, FIA_UID.2, FMT_MSA.2, FMT_MOF.1.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MTD.1, FPR_RVM.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_RVM.1, FPT_SEP.1Standards
FIPS PUB 197, ISO/IEC 15408:1999, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Title | Security Target AR-FR11 M.20 |
---|---|
Subject | [DSK_ST] |
Author | K.Nakagawa |
Creation date | D:20050526193729+09'00' |
Modification date | D:20050526194843+09'00' |
Pages | 45 |
Creator | Word 用 Acrobat PDFMaker 6.0 |
Producer | Acrobat Distiller 6.0 (Windows) |
Heuristics ?
Extracted SARs
ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1Scheme data ?
Cert Id | JISEC-CC-CRP-C0026 | |
---|---|---|
Supplier | Sharp Corporation | |
Toe Overseas Name | AR-FR11 VERSION M.20 | |
Expiration Date | 01.10.2013 | |
Claim | EAL3 | |
Certification Date | 01.06.2005 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0026_it4031.html | |
Toe Japan Name | AR-FR11 VERSION M.20 | |
Enhanced | ||
Product | AR-FR11 | |
Toe Version | VERSION M.20 | |
Product Type | IT Product ( data protection function in Multi Function Device ) | |
Assurance Level | EAL3 | |
Vendor | Sharp Corporation | |
Evaluation Facility | Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security | |
Target Link | https://www.ipa.go.jp/en/security/c0026_est.pdf | |
Report Link | https://www.ipa.go.jp/en/security/c0026_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0026_eimg.pdf | |
Description | PRODUCT DESCRIPTION The TOE is a firmware product for a Multi Function Device (hereafter referred as to “MFD”) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the fundamental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by overwriting. In addition, the TOE offers encryption and password authentication for image data that a user saves into the HDD to reuse later. By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure. |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0026', 'supplier': 'Sharp Corporation', 'toe_overseas_name': 'AR-FR11 VERSION M.20', 'expiration_date': '2013-10-01', 'certification_date': '2005-06-01', 'toe_japan_name': 'AR-FR11 VERSION M.20', 'enhanced': {'__update__': {'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'description': 'PRODUCT DESCRIPTION The TOE is a firmware product for a Multi Function Device (hereafter referred as to “MFD”) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the fundamental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by overwriting. In addition, the TOE offers encryption and password authentication for image data that a user saves into the HDD to reuse later. By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.'}, '__delete__': ['certification_date']}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0026', 'supplier': 'Sharp Corporation', 'toe_overseas_name': 'AR-FR11\n VERSION M.20', 'expiration_date': '2013-10', 'claim': 'EAL3', 'certification_date': '2005-06', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0026_it4031.html', 'toe_japan_name': 'AR-FR11\n VERSION M.20', 'enhanced': {'product': 'AR-FR11', 'toe_version': 'VERSION M.20', 'product_type': 'IT Product ( data protection function in Multi Function Device )', 'certification_date': '2005-06-03', 'assurance_level': 'EAL3', 'vendor': 'Sharp Corporation', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc.\n Center for Evaluation of Information Security', 'target_link': 'https://www.ipa.go.jp/en/security/c0026_est.pdf', 'report_link': 'https://www.ipa.go.jp/en/security/c0026_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0026_eimg.pdf', 'description': 'PRODUCT DESCRIPTION \n The TOE is a firmware product for a Multi Function Device (hereafter referred as to “MFD”) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. \n The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. \n The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the fundamental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by overwriting. \n In addition, the TOE offers encryption and password authentication for image data that a user saves into the HDD to reuse later. \n By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a5ac1d887fbdcec65ed07904ffc23e79f29245f6a5ddd83950edbf4cdb08f5eb', 'txt_hash': '6823d6c1a9d35f5832b67141c9c420beb25dc41fc75d0ec1b6a5f909bffacafb'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6b6d7e4efcb627e4391e7c7b229910f423616891b2fde5e169e6d58d9dc6735b', 'txt_hash': 'bb4215b40fa714ce3ebc4490808af9136e3ffbaf0a31dbb382b889a529946df8'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 336328, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 26, '/ModDate': "D:20050715114102+09'00'", '/CreationDate': "D:20050715113927+09'00'", '/Title': 'CRP-e', '/Creator': 'Word 用 Acrobat PDFMaker 6.0', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'IPA/JISEC', '/Subject': 'C0026', '/Company': 'IPA', '/Manager': 'IPA', '/SourceModified': 'D:20050715023914', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1130755, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 45, '/ModDate': "D:20050526194843+09'00'", '/CreationDate': "D:20050526193729+09'00'", '/Title': 'Security Target AR-FR11 M.20', '/Creator': 'Word 用 Acrobat PDFMaker 6.0', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'K.Nakagawa', '/Subject': '[DSK_ST]', '/Company': 'SHARP Corporation', '/SourceModified': 'D:20050317081500', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0026-01': 1, 'Certification No. C0026': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.RECOVER': 1, 'T.SHUNT': 1, 'T.SPOOF': 1}, 'A': {'A.NETWORK': 1, 'A.OPERATOR': 1, 'A.USER': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:1999': 1}, 'CC': {'CCIMB-99-032': 2, 'CCIMB-99-033': 2, 'CCIMB-99-031': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 3, 'ACM_SCP.1': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 3}, 'ADV': {'ADV_FSP.1': 10, 'ADV_RCR.1': 3, 'ADV_HLD.1': 3, 'ADV_HLD.2': 1}, 'AGD': {'AGD_ADM.1': 6, 'AGD_USR.1': 5}, 'ALC': {'ALC_DVS.1': 3}, 'ATE': {'ATE_COV.2': 2, 'ATE_FUN.1': 4, 'ATE_IND.2': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_MSU.1': 2, 'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FCS': {'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2, 'FCS_COP.1': 15, 'FCS_CKM.4': 6, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 13}, 'FDP': {'FDP_ITC.1': 2, 'FDP_RIP.1.1': 1, 'FDP_RIP.1': 11}, 'FIA': {'FIA_AFL.1.1': 3, 'FIA_AFL.1.2': 3, 'FIA_UAU.1': 13, 'FIA_SOS.1.1': 4, 'FIA_UAU.2.1': 3, 'FIA_UID.1': 15, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 2, 'FIA_UID.2.1': 3, 'FIA_AFL.1': 29, 'FIA_SOS.1': 30, 'FIA_UAU.2': 42, 'FIA_UAU.6': 10, 'FIA_UAU.7': 14, 'FIA_UID.2': 34}, 'FMT': {'FMT_MSA.2': 7, 'FMT_MOF.1.1': 1, 'FMT_SMF.1': 20, 'FMT_SMR.1': 43, 'FMT_MTD.1.1': 4, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 3, 'FMT_SMR.1.2': 3, 'FMT_MOF.1': 11, 'FMT_MTD.1': 35}, 'FPR': {'FPR_RVM.1': 6}, 'FPT': {'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_RVM.1': 16, 'FPT_SEP.1': 16}}, 'cc_claims': {'O': {'O.RESIDUAL': 6, 'O.REMOVE': 4, 'O.MANAGE': 7, 'O.NSP': 4, 'O.UAU': 7}, 'T': {'T.RECOVER': 5, 'T.SHUNT': 5, 'T.SPOOF': 5}, 'A': {'A.NETWORK': 5, 'A.OPERATOR': 5, 'A.USER': 4}, 'OE': {'OE.BROWSER': 6, 'OE.CIPHER': 3, 'OE.CLIENT': 5, 'OE.FIREWALL': 3, 'OE.OPERATE': 3, 'OE.USER': 3}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}, 'Rijndael': {'Rijndael': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'ISO': {'ISO/IEC 15408:1999': 2}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
c0026_erpt.pdf
. - The st_filename property was set to
c0026_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0026
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0026_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0026_est.pdf
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name AR-FR11 VERSION M.20 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "c9de82256b541d9b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0026",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"20"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0026",
"certification_date": "2005-06-01",
"claim": "EAL3",
"enhanced": {
"assurance_level": "EAL3",
"cert_link": "https://www.ipa.go.jp/en/security/c0026_eimg.pdf",
"description": "PRODUCT DESCRIPTION The TOE is a firmware product for a Multi Function Device (hereafter referred as to \u201cMFD\u201d) to reduce the risk that the inside image data be disclosed. The TOE is provided as an upgrade kit for the firmware of the MFD. The TOE offers security functions to counter the threats to image data written into the HDD and the Flash Memory, which are non-volatile mass storage devices inside the MFD. The TOE encrypts image data of the document that each job handles, before the image data are temporarily spooled to the HDD or the Flash Memory when the MFD processes jobs of copy, printer, image-scanning, fax etc., which are the fundamental functions of the MFD. And when each job is completed, the TOE clears the area occupied by the image data, by overwriting. In addition, the TOE offers encryption and password authentication for image data that a user saves into the HDD to reuse later. By these functions, the TOE secures secrecy of the non-volatile image data in the MFD, and counters unauthorized disclosure.",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
"product": "AR-FR11",
"product_type": "IT Product ( data protection function in Multi Function Device )",
"report_link": "https://www.ipa.go.jp/en/security/c0026_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0026_est.pdf",
"toe_version": "VERSION M.20",
"vendor": "Sharp Corporation"
},
"expiration_date": "2013-10-01",
"supplier": "Sharp Corporation",
"toe_japan_name": "AR-FR11 VERSION M.20",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0026_it4031.html",
"toe_overseas_name": "AR-FR11 VERSION M.20"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Sharp Corporation",
"manufacturer_web": "https://sharp-world.com/",
"name": "AR-FR11 VERSION M.20",
"not_valid_after": "2013-10-07",
"not_valid_before": "2005-06-03",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0026_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0026-01": 1,
"Certification No. C0026": 1
}
},
"cc_claims": {
"A": {
"A.NETWORK": 1,
"A.OPERATOR": 1,
"A.USER": 1
},
"T": {
"T.RECOVER": 1,
"T.SHUNT": 1,
"T.SPOOF": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL3": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 2,
"CCIMB-99-033": 2
},
"ISO": {
"ISO/IEC 15408:1999": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "IPA/JISEC",
"/Company": "IPA",
"/CreationDate": "D:20050715113927+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 6.0",
"/Manager": "IPA",
"/ModDate": "D:20050715114102+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/SourceModified": "D:20050715023914",
"/Subject": "C0026",
"/Title": "CRP-e",
"pdf_file_size_bytes": 336328,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 26
},
"st_filename": "c0026_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NETWORK": 5,
"A.OPERATOR": 5,
"A.USER": 4
},
"O": {
"O.MANAGE": 7,
"O.NSP": 4,
"O.REMOVE": 4,
"O.RESIDUAL": 6,
"O.UAU": 7
},
"OE": {
"OE.BROWSER": 6,
"OE.CIPHER": 3,
"OE.CLIENT": 5,
"OE.FIREWALL": 3,
"OE.OPERATE": 3,
"OE.USER": 3
},
"T": {
"T.RECOVER": 5,
"T.SHUNT": 5,
"T.SPOOF": 5
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.3": 3,
"ACM_SCP.1": 2
},
"ADO": {
"ADO_DEL.1": 2,
"ADO_IGS.1": 3
},
"ADV": {
"ADV_FSP.1": 10,
"ADV_HLD.1": 3,
"ADV_HLD.2": 1,
"ADV_RCR.1": 3
},
"AGD": {
"AGD_ADM.1": 6,
"AGD_USR.1": 5
},
"ALC": {
"ALC_DVS.1": 3
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.1": 1,
"ATE_FUN.1": 4,
"ATE_IND.2": 2
},
"AVA": {
"AVA_MSU.1": 2,
"AVA_SOF.1": 2,
"AVA_VLA.1": 2
}
},
"cc_security_level": {
"EAL": {
"EAL3": 4
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 13,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 6,
"FCS_COP.1": 15,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ITC.1": 2,
"FDP_RIP.1": 11,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 29,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_SOS.1": 30,
"FIA_SOS.1.1": 4,
"FIA_UAU.1": 13,
"FIA_UAU.2": 42,
"FIA_UAU.2.1": 3,
"FIA_UAU.6": 10,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 14,
"FIA_UAU.7.1": 2,
"FIA_UID.1": 15,
"FIA_UID.2": 34,
"FIA_UID.2.1": 3
},
"FMT": {
"FMT_MOF.1": 11,
"FMT_MOF.1.1": 1,
"FMT_MSA.2": 7,
"FMT_MTD.1": 35,
"FMT_MTD.1.1": 4,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 43,
"FMT_SMR.1.1": 3,
"FMT_SMR.1.2": 3
},
"FPR": {
"FPR_RVM.1": 6
},
"FPT": {
"FPT_RVM.1": 16,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 16,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
},
"FIPS": {
"FIPS PUB 197": 1
},
"ISO": {
"ISO/IEC 15408:1999": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
},
"Rijndael": {
"Rijndael": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "K.Nakagawa",
"/Company": "SHARP Corporation",
"/CreationDate": "D:20050526193729+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 6.0",
"/ModDate": "D:20050526194843+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/SourceModified": "D:20050317081500",
"/Subject": "[DSK_ST]",
"/Title": "Security Target AR-FR11 M.20",
"pdf_file_size_bytes": 1130755,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 45
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0026_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0026_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a5ac1d887fbdcec65ed07904ffc23e79f29245f6a5ddd83950edbf4cdb08f5eb",
"txt_hash": "6823d6c1a9d35f5832b67141c9c420beb25dc41fc75d0ec1b6a5f909bffacafb"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6b6d7e4efcb627e4391e7c7b229910f423616891b2fde5e169e6d58d9dc6735b",
"txt_hash": "bb4215b40fa714ce3ebc4490808af9136e3ffbaf0a31dbb382b889a529946df8"
}
},
"status": "archived"
}